Home KEEP-IT-SECURE On-Demand

KEEP-IT-SECURE On-Demand

Currently, systems, applications, and Information Security vulnerabilities are increasingly dynamic. Conducting a single annual Information Security test (PenTest) is no longer sufficient to ensure continuous protection, as infrastructures, applications, and vulnerabilities constantly evolve throughout the year.


Why an on-demand testing approach?

Unlike the KEEP-IT-SECURE-24 service, which aims to maintain a low-risk level through continuous vulnerability identification actions, the KEEP-IT-SECURE On-Demand service focuses on incisive risk reduction, adapting to each organisation's schedule and specific needs.

The tests are directed at selected applications according to their complexity. Identified vulnerabilities are recorded on a service support platform, which enables the management of the entire lifecycle of these vulnerabilities and the dynamic generation of customised reports.

Most application tests are carried out manually and meticulously, aiming to identify various vulnerabilities such as Input Validation failures, Injection, Broken Access Control, Privilege Escalation, among others.

The service includes:

A flexible engagement model that allows clients to schedule and customise penetration tests according to their needs and priorities;

Efficient resource and budget allocation through the use of service credits;

Comprehensive testing coverage, including web application, network, and mobile device testing;

Access to our vulnerability management platform to monitor and manage identified risks;

Expert support and guidance from our experienced consultants throughout the entire process.

Kits On-demand service

Our Methodology

Devoteam Cyber Trust employs a penetration testing methodology based on the best practices available in the market, with a focus on the following methodologies:

 NIST SP800-115 - "Technical Guide to Information Security Testing and Assessment";

 ISACA IS Auditing Procedure: P8 Security Assessment - Penetration Testing and Vulnerability Analysis;

 PTES - Penetration Testing Execution Standard;

 OWASP Testing Guide;

 PCI/DSS Penetration Testing Guidance.

In a general manner, the methodology employed consists of the described phases, executed cyclically, covering the various tasks and tests to be performed within the scope of a penetration test.

Kits On-demand methodology

Key Benefits

The proposed approach will allow obtaining the following key benefits:

The full involvement of consultants with extensive professional experience (>12 years) and proven know-how in the field of Information Security, specifically in penetration Testing;

Penetration testing activities supported by best practices (including International Standards), using solid and well-defined methodologies;

Re-testing will allow teams to make sure that the vulnerabilities identified have been adequately resolved;

Take advantage of an online Vulnerability Management Platform that provides organisation, information and management of reported results;

Extract dynamic reports of the tests carried out and their results for compliance purposes;

Considerably reduce the risk and your exposure to possible information security vulnerabilities by being able to detect them in good time;

Cybersecurity newsletter

Do you want to receive our newsletter?

Subscribe here

Contact us.

Headquarters

Edifício Atrium Saldanha
Praça Duque de Saldanha, nº 1, 2º andar
1050-094, Lisboa | Portugal
T: +351 21 33 03 740
E: info@integrity.pt

And we are present in 18 more countries across EMEA.
world map
 




Cookie Consent X

Devoteam Cyber Trust S.A. uses cookies for analytical and more personalized information presentation purposes, based on your browsing habits and profile. For more detailed information, see our Cookie Policy.